Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Darktrace System Status

Back
Id2e629769-60eb-4a14-8bfc-bde9be66ebeb
RulenameDarktrace System Status
DescriptionThis rule creates Microsoft Sentinel Alerts based on Darktrace system status alerts for health monitoring, fetched every 5 minutes.
SeverityInformational
Required data connectorsDarktraceRESTConnector
KindScheduled
Query frequency5m
Query period5m
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Darktrace/Analytic Rules/CreateAlertFromSystemStatus.yaml
Version1.1.0
Arm template2e629769-60eb-4a14-8bfc-bde9be66ebeb.json
Deploy To Azure
darktrace_model_alerts_CL //anything starting with 'Dt' is not an ASIM mapping 
| where dtProduct_s =="System Alert"
| extend EventVendor="Darktrace", EventProduct="Darktrace DETECT"
| project-rename ThreatCategory=dtProduct_s, EventStartTime=time_s, NetworkRuleName=friendlyName_s, SrcIpAddr=deviceIP_s, SrcHostname=hostname_s, ThreatRiskLevel=priority_code_d, ThreatRiskCategory=priority_s, DtSeverity=Severity, DtName=name_s, DtStatus=status_s, DtMessage=Message, DtURL=url_s, DtUUID=uuid_g
queryPeriod: 5m
query: |
  darktrace_model_alerts_CL //anything starting with 'Dt' is not an ASIM mapping 
  | where dtProduct_s =="System Alert"
  | extend EventVendor="Darktrace", EventProduct="Darktrace DETECT"
  | project-rename ThreatCategory=dtProduct_s, EventStartTime=time_s, NetworkRuleName=friendlyName_s, SrcIpAddr=deviceIP_s, SrcHostname=hostname_s, ThreatRiskLevel=priority_code_d, ThreatRiskCategory=priority_s, DtSeverity=Severity, DtName=name_s, DtStatus=status_s, DtMessage=Message, DtURL=url_s, DtUUID=uuid_g  
name: Darktrace System Status
entityMappings:
- fieldMappings:
  - columnName: SrcHostname
    identifier: HostName
  entityType: Host
- fieldMappings:
  - columnName: SrcIpAddr
    identifier: Address
  entityType: IP
eventGroupingSettings:
  aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Darktrace/Analytic Rules/CreateAlertFromSystemStatus.yaml
alertDetailsOverride:
  alertDynamicProperties:
  - value: DtURL
    alertProperty: AlertLink
  - value: EventVendor
    alertProperty: ProviderName
  - value: EventProduct
    alertProperty: ProductName
  - value: ThreatCategory
    alertProperty: ProductComponentName
  alertSeverityColumnName: 
  alertDescriptionFormat: '{{DtMessage}}'
  alertDisplayNameFormat: 'Darktrace: {{ThreatRiskLevel}} - {{NetworkRuleName}}'
  alertTacticsColumnName: 
requiredDataConnectors:
- connectorId: DarktraceRESTConnector
  dataTypes:
  - darktrace_model_alerts_CL
description: |
    'This rule creates Microsoft Sentinel Alerts based on Darktrace system status alerts for health monitoring, fetched every 5 minutes.'
kind: Scheduled
version: 1.1.0
queryFrequency: 5m
severity: Informational
relevantTechniques: 
triggerOperator: gt
triggerThreshold: 0
customDetails:
  ThreatRiskCategory: ThreatRiskCategory
  DtMessage: DtMessage
  EventStartTime: EventStartTime
  DtSeverity: DtSeverity
  DtStatus: DtStatus
  ThreatRiskLevel: ThreatRiskLevel
  NetworkRuleName: NetworkRuleName
  DtName: DtName
tactics: 
id: 2e629769-60eb-4a14-8bfc-bde9be66ebeb